Mostrar el registro sencillo del ítem
dc.contributor.author | Villalón-Huerta, Antonio | es_ES |
dc.contributor.author | Marco-Gisbert, Héctor | es_ES |
dc.contributor.author | Ripoll-Ripoll, Ismael | es_ES |
dc.date.accessioned | 2023-06-16T18:02:12Z | |
dc.date.available | 2023-06-16T18:02:12Z | |
dc.date.issued | 2022 | es_ES |
dc.identifier.uri | http://hdl.handle.net/10251/194313 | |
dc.description.abstract | [EN] Different kill chain models have been defined and analyzed to provide a common sequence of actions followed in offensive cyber operations. These models allow analysts to identify these operations and to understand how they are executed. However, there is a lack of an equivalent model from a defensive point of view: this is, there is no common sequence of actions for the detection of threats and their accurate response. This lack causes not only problems such as unstructured approaches and conceptual errors but, what is most important, inefficiency in the detection and response to threats, as defensive tactics are not well identified. For this reason, in this work we present a defensive kill chain approach where tactics for teams in charge of cyber defense activities are structured and arranged. We introduce the concept of SOC Critical Path (SCP), a novel kill chain model to detect and neutralize threats. SCP is a technology¿independent model that provides an arrangement of mandatory steps, in the form of tactics, to be executed by Computer Network Defense teams to detect hostile cyber operations. By adopting this novel model, these teams increase the performance and the effectiveness of their capabilities through a common framework that formalizes the steps to follow for the detection and neutralization of threats. In this way, our work can be used not only to identify detection and response gaps, but also to implement a continuous improvement cycle over time. | es_ES |
dc.language | Inglés | es_ES |
dc.publisher | Institute of Electrical and Electronics Engineers | es_ES |
dc.relation.ispartof | IEEE Access | es_ES |
dc.rights | Reconocimiento (by) | es_ES |
dc.subject | SOC Critical Path | es_ES |
dc.subject | Security Operations Center | es_ES |
dc.subject | Computer Network Defense | es_ES |
dc.subject | Cyber Kill Chain | es_ES |
dc.subject.classification | ARQUITECTURA Y TECNOLOGIA DE COMPUTADORES | es_ES |
dc.title | SOC Critical Path: A defensive Kill Chain model | es_ES |
dc.type | Artículo | es_ES |
dc.identifier.doi | 10.1109/ACCESS.2022.3145029 | es_ES |
dc.rights.accessRights | Abierto | es_ES |
dc.contributor.affiliation | Universitat Politècnica de València. Escola Tècnica Superior d'Enginyeria Informàtica | es_ES |
dc.description.bibliographicCitation | Villalón-Huerta, A.; Marco-Gisbert, H.; Ripoll-Ripoll, I. (2022). SOC Critical Path: A defensive Kill Chain model. IEEE Access. 10:13570-13581. https://doi.org/10.1109/ACCESS.2022.3145029 | es_ES |
dc.description.accrualMethod | S | es_ES |
dc.relation.publisherversion | https://doi.org/10.1109/ACCESS.2022.3145029 | es_ES |
dc.description.upvformatpinicio | 13570 | es_ES |
dc.description.upvformatpfin | 13581 | es_ES |
dc.type.version | info:eu-repo/semantics/publishedVersion | es_ES |
dc.description.volume | 10 | es_ES |
dc.identifier.eissn | 2169-3536 | es_ES |
dc.relation.pasarela | S\453853 | es_ES |
dc.contributor.funder | Universitat Politècnica de València | es_ES |
dc.subject.ods | 09.- Desarrollar infraestructuras resilientes, promover la industrialización inclusiva y sostenible, y fomentar la innovación | es_ES |
dc.subject.ods | 11.- Conseguir que las ciudades y los asentamientos humanos sean inclusivos, seguros, resilientes y sostenibles | es_ES |
dc.subject.ods | 16.- Promover sociedades pacíficas e inclusivas para el desarrollo sostenible, facilitar acceso a la justicia para todos y crear instituciones eficaces, responsables e inclusivas a todos los niveles | es_ES |
upv.costeAPC | 1524,66 | es_ES |